Inproceedings,

On the viability of pro-active automated PII breach detection: A South African case study.

, , and .
SAICSIT, page 251. ACM, (2014)

Meta data

Tags

Users

  • @dblp

Comments and Reviews